September 19, 2016 By Jason Hardy 3 min read

The combination of mobile and cloud may be the most dangerous threat to your enterprise security. While many security analysts focus on either mobile or cloud security, few think about them in tandem. Fewer still consider how to leverage enterprise mobility management (EMM) solutions and a cloud access security broker (CASB) at the same time.

I’ve spent a great deal of time writing and talking about mobile security and the importance of developing a strategy that goes beyond the device. I developed an e-guide, “Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears,” that introduced the threats and four imperatives to consider in developing a mobile security strategy: protecting devices, securing content and collaboration, safeguarding applications and data, and managing access and fraud.

What I did not explain in the e-guide, however, is how cloud and mobile threats need to be addressed together.

A Dangerous Combination

Mobile and cloud are both here to stay. They are a part of both our personal and business lives, and we all know these two facets are hopelessly intertwined. These technologies are ubiquitous because they are simple and easy to access. Looking for a place to store data for safe keeping? Back it up to the cloud. Need to share large amounts of data with others? Share it in the cloud. Looking for a quick and easy solution to a problem? Download an app from the cloud. Want to do all of these things and have access to it from anywhere? Use your mobile device.

Simplicity is good, right? Who doesn’t want fast, easy deployment and adoption of technology and applications? It sounds like an IT dream, but the combination of mobile and cloud can create an IT nightmare.

Let’s face it: As security and IT professionals, we like control. The problem with mobile, specifically bring-your-own-device (BYOD), and cloud is that the end user holds the keys to the kingdom. The end user can change devices, upgrade OS, download apps, connect to the cloud and do many other things outside of the awareness of security and IT. This sourcing and adoption of technology outside of the normal approval process, known as shadow IT, exposes the enterprise to significant risks.

EMM and a CASB: Better Together

So how can you address this combination of mobile and cloud challenges? The best way is to deploy an EMM solution and a CASB. If these solutions are integrated, all the better. Some contend that these tools are mutually exclusive, but the combination of the two will give you a higher level of protection than either on its own.

An EMM solution provides the tools you need to manage devices, applications, content and collaboration. Regardless of the model you choose to support, an EMM should enable you to support both corporate-owned devices and BYOD. Robust EMM will also help you manage access, and support malware and fraud detection.

Bundling all of these features into an EMM solution addresses the most common threats to the mobile platform, but EMM alone does not address cloud security. To extend protection to cloud resources, you need a CASB. A CASB will provide you with the ability to detect app usage, connect users to authorized apps and protect the enterprise through policy enforcement.

A Powerful One-Two Punch

By deploying both EMM and a CASB, you can defuse threats that come from the combination of mobile and cloud. Together, they provide the necessary visibility and management tools to know what is happening and what resources are being accessed from a particular device. You can identify risky devices, apps and user activity, and take immediate action to protect the enterprise.

By deploying an EMM and CASB solution, you gain the ability to do so many things to protect your enterprise. For instance, imagine having the tools to:

  • Remotely wipe a lost or stolen device.
  • Identify a rooted or jailbroken device.
  • Detect malware on a mobile device and deny access to the enterprise.
  • Redirect end users from unauthorized cloud apps to authorized cloud apps.
  • Provide users with a catalog of approved apps.
  • Manage app usage and identify the most popular apps.

These are just a few examples of what you can do with a combined EMM/CASB solution to identify what is happening outside and protect what is inside your perimeter.

More from Cloud Security

Autonomous security for cloud in AWS: Harnessing the power of AI for a secure future

3 min read - As the digital world evolves, businesses increasingly rely on cloud solutions to store data, run operations and manage applications. However, with this growth comes the challenge of ensuring that cloud environments remain secure and compliant with ever-changing regulations. This is where the idea of autonomous security for cloud (ASC) comes into play.Security and compliance aren't just technical buzzwords; they are crucial for businesses of all sizes. With data breaches and cyber threats on the rise, having systems that ensure your…

Risk, reward and reality: Has enterprise perception of the public cloud changed?

4 min read - Public clouds now form the bulk of enterprise IT environments. According to 2024 Statista data, 73% of enterprises use a hybrid cloud model, 14% use multiple public clouds and 10% use a single public cloud solution. Multiple and single private clouds make up the remaining 3%.With enterprises historically reticent to adopt public clouds, adoption data seems to indicate a shift in perception. Perhaps enterprise efforts have finally moved away from reducing risk to prioritizing the potential rewards of public cloud…

AI-driven compliance: The key to cloud security

3 min read - The growth of cloud computing continues unabated, but it has also created security challenges. The acceleration of cloud adoption has created greater complexity, with limited cloud technical expertise available in the market, an explosion in connected and Internet of Things (IoT) devices and a growing need for multi-cloud environments. When organizations migrate to the cloud, there is a likelihood of data security problems given that many applications are not secure by design. When these applications migrate to cloud-native systems, mistakes in configuration…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today